Open Access iconOpen Access

ARTICLE

crossmark

Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds

Muhammad Akram1, Muhammad Waseem Iqbal2,*, Syed Ashraf Ali3, Muhammad Usman Ashraf4, Khalid Alsubhi5, Hani Moaiteq Aljahdali6

1 Department of Computer Science, Superior University Lahore, 54000, Pakistan
2 Department of Software Engineering, Superior University Lahore, 54000, Pakistan
3 Department of Computer Science, The Institute of Management Sciences (PAK-AIMS), Lahore, 54000, Pakistan
4 Department of Computer Science, GC Women University Sialkot, Pakistan
5 Department of Computer Science, King Abdulaziz University, Jeddah, Saudi Arabia
6 Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia

* Corresponding Author: Muhammad Waseem Iqbal. Email: email

Computers, Materials & Continua 2022, 72(3), 6061-6077. https://doi.org/10.32604/cmc.2022.028272

Abstract

In cipher algorithms, the encryption and decryption are based on the same key. There are some limitations in cipher algorithms, for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless. This paper aims to improve the said limitations by designing of Triple key security algorithm (TKS) in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext. Each plaintext character is substituted by an alternative message. The mode of substitution is transformed cyclically which depends on the current position of the modified communication. Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR (XOR) of the 1st key. This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack. By utilization of the TKS algorithm, the decryption is illustrated, and security is analyzed in detail with mathematical examples.

Keywords


Cite This Article

M. Akram, M. Waseem Iqbal, S. Ashraf Ali, M. Usman Ashraf, K. Alsubhi et al., "Triple key security algorithm against single key attack on multiple rounds," Computers, Materials & Continua, vol. 72, no.3, pp. 6061–6077, 2022. https://doi.org/10.32604/cmc.2022.028272



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1368

    View

  • 599

    Download

  • 0

    Like

Share Link